CN1792060B - Methd and system for authenticating physical object - Google Patents
Methd and system for authenticating physical object Download PDFInfo
- Publication number
- CN1792060B CN1792060B CN2004800136222A CN200480013622A CN1792060B CN 1792060 B CN1792060 B CN 1792060B CN 2004800136222 A CN2004800136222 A CN 2004800136222A CN 200480013622 A CN200480013622 A CN 200480013622A CN 1792060 B CN1792060 B CN 1792060B
- Authority
- CN
- China
- Prior art keywords
- property set
- attribute
- robust
- measurement
- controlling value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 claims abstract description 63
- 238000005259 measurement Methods 0.000 claims abstract description 33
- 239000013598 vector Substances 0.000 claims description 37
- 230000006870 function Effects 0.000 claims description 36
- 238000006243 chemical reaction Methods 0.000 claims description 29
- 230000008569 process Effects 0.000 claims description 23
- 239000011159 matrix material Substances 0.000 claims description 22
- 230000007246 mechanism Effects 0.000 claims description 22
- 230000009466 transformation Effects 0.000 claims description 14
- 230000009467 reduction Effects 0.000 claims description 9
- 239000000284 extract Substances 0.000 claims description 7
- 238000000926 separation method Methods 0.000 claims description 4
- 238000000605 extraction Methods 0.000 claims 1
- 238000003780 insertion Methods 0.000 claims 1
- 230000037431 insertion Effects 0.000 claims 1
- 230000001419 dependent effect Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000035772 mutation Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000000513 principal component analysis Methods 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 201000010099 disease Diseases 0.000 description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000000053 physical method Methods 0.000 description 2
- 239000013643 reference control Substances 0.000 description 2
- 210000001525 retina Anatomy 0.000 description 2
- 235000012364 Peperomia pellucida Nutrition 0.000 description 1
- 240000007711 Peperomia pellucida Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005352 clarification Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000013139 quantization Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A system for authenticating a physical object includes an enrolment device, an authentication device, and a storage for storing authentication data. The enrolment device includes an input for receiving a property set Y of the object measured using a measurement procedure. A processor is used for creating a property set I from the measured property set Y that meet a predetermined robustness criterion. It then creating a property setA from the property set I that includes less information on the actual properties than property set Y, and finally generates a control value Vin dependence on properties of the property set A. An output is used for supplying the control value to the storage as part of the authentication data. The enrolment device operates in an analogous way.
Description
The present invention relates to a kind of method for physical object generation verify data, and a kind of method that physical object is authenticated.In addition, the present invention relates to a kind of Verification System.
The physical object authentication can be used to many application, such as access security building or access digital data (for example being stored in computer or the movable storage medium) conditionally conditionally, or be used for identifying purpose (for example being used for collecting the expense of specific activities) to the people who is identified.The biometrics authentication is well-known.In this system, use a kind of suitable reader, such as fingerprint scanner or iris scanner, read a people's (physical object) biometrics attribute.These attributes and reference data compare.If coupling, this people just is identified maybe can be allowed visit.Reference data about this user has been acquired and has been stored safely as far back as registration phase, for example is stored in a safety database or the smart card.
It also can not be human wanting authentic physical object.For example, this object can be a kind of storage medium that contains protected digit content as CD, DVD, solid-state memory.As a kind of measure that prevents unauthorized reproduction and/or copy, described content itself can be stored with a kind of form of encryption.A kind of believable storage medium typically comprises measurable attribute, and it makes that promptly reproduction/copying equipment can obtain required decruption key preferably in such a way, and unauthorized reproducing device then can not obtain these keys.Typically these attributes are not stored as routine data, because this will make the man-to-man illegal copies of making protected content and attribute become possibility.This copy thereby can not distinguish with original contents and be considered to believable.On the contrary, these attributes are hidden in the medium itself at least in part, rather than with its as storage on storage medium.These attributes are that the variation as the physical parameter of storage medium obtains from storage medium.For CD, a kind of way is by using a kind of so-called " wobble tracks (Wobble) ".Different media will have a different wobble tracks or not have wobble tracks at all, so authentication result will can not produce to the required decruption key of contents decryption.With reference to the same assignee's of the present invention United States Patent (USP) 5,724,327 (attorney docket PHN 13922), this patent has been described this " wobble tracks " and the various technology of stored information therein created.Wobble tracks is an example of the function (PUF) that physically can not clone.
Typically, authentication protocol converts these attributes to a shielded controlling value by cryptography method.The controlling value that generates and a kind of reference control value of storage compare.For example, reference data is stored on the central server, and this server can be in the office space of having only the member to visit, bank or club, or maybe needs many other places of being identified in user's visit of can having ready conditions.Because biometrics is human unique identifier, privacy concern may occur.People are for seeming biometric information that safe database provides them and feel uneasy to many.Practice shows that biometric information can become by unsafe realization (for example being broken through by the hacker) or the abuse by the Systems Operator can be for utilization.In enrollment process, not protected biometric data can be for utilizing especially.If this information all can be for utilizing in many places, the possibility of abuse will increase.Should remember that also biometric data is that the good user identity of a kind of usefulness is represented.Some of " theft " people or most of biometric data (may be by only breaking through a kind of implementation) can be regarded as stealing the electronics equivalents of a people's identity.The data of theft may make to obtain and be subjected to the visit of system of biometric data protection relatively easy to many other.Thereby, use " identity theft " of biometric information to have more serious consequence than the theft of " simply " credit card.It is relatively easy to cancel a credit card, but the biometrics identity of cancelling a people wants complicated many.Using another problem of biometric information (particularly retina scanning) is that it can expose disease pattern, thereby is very easily abused.In these problems some are also relevant with the authentication of the physical object that is not based on biometric data.For example, people have one can be by reading the identity card that card image is verified automatically.If this card is very successful and be used to many application, this card cancel the trouble that will become.
Many authentication protocols use a kind of one-way function, such as hash (hash), this function reduced need be in reference control value data quantity stored.Conventional one-way function is very responsive for the medium and small disturbance of input.Therefore, when the input data had noise, those cryptographic primitives can not directly be used.When the input data are when obtaining such as the measurement of physical objecies such as biometrics, PUF, this typical just situation.
WO 02/078249 has described a kind of authentication method, and this method is that n-ties up the vectorial enterprising row operation in the Euclidean space at the attribute of measuring directly.Some unspecified features have been extracted, such as X
1... X
s∈ R, and estimated each feature X
i, i=1 ..., the average μ of s
iAnd variances sigma
i 2In addition, selected a real number r ∈ (0,1) and formed code book B={ (w
1..., w
s): w
i=r σ
ik
iI=1 ..., s; k
i∈ Z}.At next step, selected a random vector δ=(δ
1..., δ
s), make c=(c
1..., c
s), c
i=μ
i-δ
iIt is an effective code word among the password B.At last, hash form h (c) and the δ of c are stored.Authentication comprises selects code word c ': a c '=argmin
c∈
B|| x '-δ-c|| and the hash form h of c ' (c ') compared with storing value h (c).In other words, input feature vector Xi is shifted random number δ
IThe position, and should be worth with step-length r σ
iBe quantized from the nearest point of grid.In this method, offset delta and code word c
0The hash form can obtain (perhaps, if database is revealed, they just become available) publicly.Assailant's hash function that can reverse in principle can be supposed, and code word c can be obtained
0, thereby given the assailant to identity x
0Visit.In addition, this scheme is insecure.The probability of characteristic vector that correctly authenticates s-measured on the user of honesty dimension is less than 2
-s, this is too low for the practical application amount.
A target of the present invention provides a kind of improved method and system that is used to authenticate based on the physical object attribute.
In order to realize described purpose of the present invention, the method that a kind of generation is used for verify data that physical object is authenticated comprises:
Use a kind of property set Y of measuring process measuring object;
Create property set I according to the property set Y that measures, this property set I satisfies a kind of predetermined robust standards;
Create property set A according to property set I, this property set A comprises still less the information about actual attribute than property set Y;
Attribute according to property set A generates a controlling value V and this controlling value is inserted verify data.
The method according to this invention acts directly on the measured attribute, rather than these best property of attribute mapping are arrived password value.Utilizing before cryptography method handles, the attribute of these measurements must be quantized into centrifugal pump.Contain noise owing to measure attribute kit, quantized result may be different in different experiments.Especially, if the value of a physical parameter near a quantization threshold, the trace noise all may change the result.After the data that quantized are applied an encryption function, trickle variation will be exaggerated and the result will not have any similarity with expected result.This fundamentally is an essential attribute of encryption function.In order to reduce risk, at first create the attribute of one group of robust from measuring collection at the enterprising line operate of unreliable attribute.The collection of described robust comprises that those have the attribute of high s/n ratio.Then to reduce the amount of information in the property set of robust.The property set of this simplification has constituted the basis of the controlling value that is used to authenticate.Crack this controlling value and will only expose one group of information of simplifying.The property set of robust will still comprise still unexposed information.These unexposed information can be used to other authentication application, even these are used also based on those data that have been exposed.
According to the method for dependent claims 2, carry out a kind of contracted transformation.This contracted transformation converts predetermined input value to corresponding output valve.It also will convert identical corresponding output valve to quite similar any input value in the predetermined input value.On the other hand, visibly different input value is converted into different output valves.An example of this contracted transformation is Δ-contracting function, and this function has first input (cryptography data), and second imports (auxiliary data) and generated output based on first and second inputs.Second the input be a kind of controlling value, this value defined be used for the value of first input signal scope (for example use a kind of preset distance measure in case the target input value within preset distance) and with the corresponding output valve of each first input value scope.Contracted transformation has further increased robustness, because an attribute of physical object always is converted into identical output valve, as long as this attribute only is subjected to limited noise effect so that it still is within the identical input value scope.In addition, it has reduced amount of information.It is impossible directly judging input from output.
Described as the method in dependent claims 3, contracted transformation has the binary number that the attribute transformation that surpasses two probable values (typically being 8 bit values at least) becomes the symbol of this attribute of expression with one.This symbol can be plus or minus.On the occasion of representing that negative value can be represented with numeral " 1 ", or vice versa with digital " 0 ".The null value attribute should not appear at concentrating of robust usually.
Described as the method in dependent claims 4, the step of creating property set A comprises a subclass selecting property set I.Selecting subclass also is to reduce a kind of effective ways of amount of information.Described as the method in dependent claims 5, preferably, subclass selects to be subjected to auxiliary data W to instruct.For example, auxiliary data can be specified and be used which attribute and do not use which attribute.Auxiliary data W is inserted into verify data and uses in the verification process of reality.Preferably, auxiliary data W is unique for an authentication application.Use a different selection course by using for each, cracking the subclass that is used for an application can not influence other application (being like this when not being exposed for abundant data at least).
Described as the method in the dependent claims 7, a kind of robust standards of predetermined signal to noise ratio based on tested attribute is used in the establishment of the attribute of robust.The step of creating property set I is included in property set Y and goes up the property set I that a kind of conversion Γ of execution creates separation
1And I
2, I here
1The signal to noise ratio of attribute compare I
2The signal to noise ratio of attribute want high; And use I
1As property set I.Described standard may be based on the statistical attribute of measuring process, thereby can extract on statistics attribute reliably.Described standard can also constantly be revised up to property set I
1The attribute that comprises desired amt.
Preferably, conversion Γ is a kind of linear transformation, and it converts the vector of a representation attribute collection Y to vector that I is gathered in an expression, and its component is α
i, each component of a vector α here
IFor other component of a vector α
j(j ≠ i) is independently, and wherein component of a vector is to arrange according to the signal to noise ratio of estimating.This is a kind of effective ways of attribute of the independent robust that obtains desired amt.Suitable conversion can be differentiated conversion based on principal component analysis or Fisher.
As described in the method for dependent claims 10, the statistical attribute that can be used to conversion comprises a covariance matrix and a corresponding Distribution Statistics F who derives from the estimation attribute X of object.
As described in the method for dependent claims 11, the absolute value of being created is used to gather I greater than the attribute of thresholding
1Other attribute does not re-use.Described thresholding is that the noise level from tested property set is derived.
As described in the method for dependent claims 12,, then, attribute just can create controlling value V by being carried out encryption function since created a robust and property set that simplified.By not exposing property set itself only is that its cryptography is represented, the detection of information is difficulty more.Preferably, described encryption function is an one-way function, such as a uni-directional hash.
These and others of the present invention will become fairly obvious, and will set forth in conjunction with the embodiment that hereinafter describes.
In the accompanying drawings:
Fig. 1 has shown a block diagram according to Verification System of the present invention; And
Fig. 2 has shown the main treatment step in the preferred embodiment.
Fig. 1 has shown a block diagram according to the system 100 of this invention. Described system comprises a calling mechanism 110, and this calling mechanism 110 generates verify data and it is stored in the memory 130. For this reason, described calling mechanism comprises an input 112 that be used for to receive the attribute that measures from physical object 105. Described attribute is to use suitable measurement mechanism 120 measured, and this measurement mechanism 120 can be integrated into calling mechanism. Physical object can be the individual. What show among the figure is the fingerprint 105 of measuring from the person. Also can measure other biometric data, such as the scanning iris. These technology itself are well-known and will no longer illustrate. Described object also can not be human. For example, this object can be an electronic identification card. Specifically, this object can be a data medium, such as a kind of digital audio/video content vector (for example CD). In this case, object 105 can with memory 130 combinations, namely this object also carries verify data. If should be to liking a storage medium object, described attribute can be the mutation of a physical parameter of storage medium. These mutation can be to have a mind to produce, and are specific to each object, perhaps can be at random. As long as mutation is enough unique for object, just can be used to authentication. What no matter be physical object, all suppose for this physical object to measure many attributes. In principle, described attribute is " simulation ", and each attribute is quantized into the value of many bits. Typically, use the property value of 8 bits to I haven't seen you for ages. Described calling mechanism comprises a processor 114 that is used for generating verify data. This processor can make any suitable processor, such as the used processor of PC for example. Typically, used general processor is to work under the control of suitable program. This program can be stored in the nonvolatile storage. Because calling mechanism preferably will create the verify data that is difficult for being cracked, so preferably should take some security steps. For example, calling mechanism can be placed in the security context or the section processes step can be performed in security module, in a kind of anti-cryptography module of stealing secret information. Described verify data is stored in the memory 130 by exporting 116.
Described system also comprises at least one authenticate device 140. In principle, can finish authentication with the same equipment that is used for registration. In this case, calling mechanism and authenticate device are same. In description, suppose that two devices are independently with the difference between clarification registration and the authentication. Calling mechanism comprises an input 142 that be used for to receive the attribute that measures from physical object 105. Described attribute is to use suitable measurement mechanism 170 to measure, and this measurement mechanism 170 can be integrated into authenticate device. Preferably, measurement mechanism 120 and 170 has similar design. What measure is same physical object, and this physical object has created verify data by authenticate device 110. Described authenticate device comprises a processor 144 that is used for comparison other attribute and verify data. This processor can be any suitable processor, such as the used processor of PC. Typically, used general processor is to work under suitable programme-control. This program can be stored in the nonvolatile memory. The input of authenticate device also is used to receive verify data from memory 130. Should recognize, calling mechanism, memory and authenticate device can be physically far apart. If so, can exchange verify data with suitable means of communication. Memory 130 can also be integrated in the calling mechanism.
In description, the term authentication is used with a kind of implication of broadness. Described technology can be used to checking: this physical object is believable, and is namely genuine, but also can be used to set up this object or any other suitable people's identity. The result of described method and system is a controlling value. This controlling value can be used to any purpose. For example, if coupling occurs during authenticating, this can trigger an action, as allowing a people enter the entrance of a building or a computer. Similarly, the stored data corresponding with controlling value of can packing into. For example, this can be any type of sign, and as a people's name, but this can be an identification number equally. Even can extract an account No., thereby allow the access of authentic user to the account. All these mutation do not exceed professional's professional skill, and will be not described in detail. This explanation will concentrate on uses biometric personnel to authenticate (comprising identification). Should recognize that same technology also can be used to many other purposes, they will authenticate the attribute that measures from physical object jointly.
Three demands below the agreement that physical object is authenticated according to the present invention is designed to satisfy:
(i) to the robustness of noise
In essence, owing to relate to biostatistics or physical measurement, measurement can be subjected to the infringement of noise. It is robust that certificate scheme is designed to little noise, if namely represent system with measuring X+ ∈, here X is the template of "True", ∈ measures noise, system should be able to provide answer when whether X+ ∈ belongs to the request of a people or an object definitely to measuring so, and this people or object claim that oneself is. This demand will be shunk institute by the term noise and be referred to.
(ii) safety
Different security considerations is arranged in the exploitation of authentication protocol. At first, in the situation of assailant's access less than template, he will palm off the another one people must be very difficult. Secondly, the assailant must derive about template or secret any information from the information that server obtains. Below, this certificate scheme is known as and zero is exposed, if the assailant can not extract any information about secret from the information that he receives, or the E-exposure of being known as, be negligible words if the information that the assailant obtains is compared with the information that he must guess. The 3rd, must consider the protection of anti-" eavesdropping ", namely carry the possibility that the secret communication channel victim of coding is seen. Can use the standard method of similar " zero knowledge " agreement to eliminate the third threat, will no longer describe in detail here.
(iii) privacy
The meaning of privacy is, even in the situation that the safety database of storage controlling value is captured, and in the secret victim of " Alice " (its identity is stored in controlling value that people in the representing) situation about grasping, this assailant can be the Alice in this application-specific with oneself authentication in principle, but he can not be the Alice in the application of the identical biometric template of other any dependence with oneself authentication. In other words, by shooting this database, the assailant will recognize a certain secrets using its biometric template to generate for Alice, but he can not recognize template itself. Therefore, he can not produce other secret of the template generation of using Alice. But the more important thing is that the sensitive information that can derive as there is specific disease in retina scanning, can not expose from template.
Registration by the calling mechanism execution:
In this stage, people or physical object must be accessed and for example be positioned at " authentication center " calling mechanism (CA). This object/people's attribute is measured, process and be used as reference data V storage, and in order to using with any auxiliary data in the back, these auxiliary datas may be used to instruct this processing. Preferably, auxiliary data is determined by the attribute of X. In on-line Application, these data can be stored in central database or these data can and be provided for the ISP by the digital signature of CA proof.
In brief, carry out following step according to calling mechanism of the present invention:
(1) obtain measurement, provide property set Y,
(2) dependency collection Y creates the robust attribute, provides the attribute I of one group of robust,
(3) information among the reduction property set I provides property set A,
(4) generate controlling value V based on property set A,
(5) storage V and any auxiliary data W that is used to instruct processing.
Just as will be described hereinafter, step 2 and 3 can be regarded as a signal processing function G and operate on property set Y, under the control of auxiliary data W, provide output G (Y, W).This has formed property set A.Signal processing can be shown as step 2 and 3 independently sequential processes step (illustrating among two embodiment hereinafter), but also can be performed (showing among an embodiment hereinafter) in the treatment step of an integral body.Auxiliary data W is guiding step 2 and 3 simultaneously.For authentication, typically step 2 and 3 can be performed in an operation, because W is known.
Controlling value can be property set A simply.In order to protect the communication line between calling mechanism, memory and the authenticate device, in a preferred embodiment, create on the attribute that controlling value V is included in property set A and carry out an encryption function.Preferably, this encryption function is the one-way function of a homomorphism.Suitable hash function function that comes to this.
For the r ∈ Z that selects at random
nWith g be the maker (Paillier encryption function) of a son group, r| → r
2Mod n, m| → g
M+nrMod n
2The secret encryption of deriving from biometric measurement then is stored in database.The one-way function of these homomorphisms allows to set up a kind of agreement of zero knowledge, is used to check the knowledge of template and can expose any information.Preferably, owing to the communication in the zero-knowledge protocol process changes with each session, so this communication line can obtain better protection.
Authentication by the authenticate device execution:
This authentication protocol comprises a kind of measuring equipment, and this equipment extracts the analogue measurement data Y from physical object.These analogue datas then by a signal processing function G (Y, W) processed, utilize auxiliary data W, and at last by being protected to its one-way hash function h that uses an anticollision.Suitably choice function G is very important.More accurately, the step below this agreement is carried out:
(1) obtain V and any auxiliary data W that is used to instruct processing,
(2) obtain measurement, provide property set Y,
(3) dependency collection Y creates the attribute of robust, provides the attribute I of one group of robust,
(4) information among the reduction property set I provides property set A,
(5) generate controlling value V ' based on property set A,
(6) V ' and V are compared: if coupling, this object is just certified.
Attention: the auxiliary data (if there is) is used to instruct in similar mode in a kind of and the enrollment process and handles.For authentication, typically step 2 and 3 can be performed in an operation, because know that from enrollment process which attribute is robust (being described by auxiliary data W), therefore in many examples, might be only on the attribute of selecting execution in step 4 and need not create a less set clearly.
Measure
The property set Y of the physical object that a kind of suitable measuring process is used to obtain certified (or registration), this collection certain actual corresponding attribute (such as biometrics) X=(X with this object
1..., X
n) measured value Y=(Y
1..., Y
n) ∈ R
nBe expressed as a n-dimensional vector.Always introduce noise because measure, measured value vector Y=(Y
1..., Y
n) comprise a real signal X=(X
1..., X
n) and a pollution noise E=(E
1..., E
n).In specification, will use these vectors.Should recognize that any multidimensional numeral (measured value) array can easily be converted to vector (for example by row being connected into a vector).As hereinafter in further detail as described in, in a preferred embodiment, on a vector with less component, created a controlling value.In order to make this controlling value have rational fail safe, it is many normally as the bits of password to require this subclass to comprise, such as 56 bits that are used for DES or be used for 128 bits of AES.In this preferred embodiment, Y should comprise more component, for example more than the twice.The length of Y can depend on the amount of information (for example more noise means the more measured value of needs) that exists in noise level and the measured value.
As will be hereinafter described, the signal processing of two preferred embodiments be based on the statistical attribute of signal X and/or noise E.These statistical attributes can be estimated with any suitable method, for example by taking multiple measurements and then use the well-known suitable statistical estimation method of a kind of those skilled in the art to estimate described statistical attribute between record time.
Create the attribute of one group of robust
Create a property set I from the property set that measures, this property set I satisfies a kind of predetermined robust standards.Preferably, Yu Ding robust standards is based on the signal to noise ratio of the attribute that measures.Property set Y is used to create the property set I of two separation
1And I
2, I here
1The signal to noise ratio of attribute be estimated as and compare I
2The signal to noise ratio of attribute want high.So I
1Be used as property set I.Hereinafter, will three alternatives that are used to create the property set of robust be described.Provide robustness to need not to use error correcting code according to embodiments of the invention for the measurement mistake.
First embodiment
Be set I
1The attribute of robust selected set Y those have the attribute of enough big absolute value.Enough mean X greatly
iFor Y
iContribution be greater than E
iContribution, so signal to noise ratio (S/N) is at least 1.Measure by carrying out several times, can obtain the statistical estimate preferably of noise level Ei at enrollment process.Preferably, have only those to surpass the Y of this estimated value (for example S/N>3) significantly
iAttribute be as robust and be used, promptly be given to the set I
1If the noise level of measuring process is known, just do not need to carry out repeatedly to measure to obtain this estimation.
The second and the 3rd embodiment
In these two embodiment, by on property set Y, carrying out the property set I that a kind of conversion Γ creates two separation
1And I
2Create property set I, here I
1The signal to noise ratio of attribute be estimated as and compare I
2The signal to noise ratio of attribute want high.Described conversion Γ depends on the statistical attribute of measuring process.Preferably, statistical attribute comprises a covariance matrix and a corresponding Distribution Statistics F who derives from the estimation attribute X of this object.Advantageously, described conversion Γ is a kind of linear transformation, and this conversion converts the vector of a representation attribute collection Y to vector that I is gathered in an expression, and the component in this vector is α
i, each component of a vector α here
iWith other component of a vector α
j(j ≠ i) is independently, and wherein each component of a vector is classified according to the signal to noise ratio of estimating.Preferably, give set I
1(or I
2) thresholding of specified attribute is to derive from the noise level of measuring property set Y.Based on mentioned above principle, will be described conversion Γ at two embodiment (the second and the 3rd embodiment).First embodiment uses principal component analysis; Second embodiment uses the Fisher conversion.
Second embodiment-principal component analysis.
Suppose n-dimensional vector X=(X
1..., X
n) have a distribution F.Make that ∑ is corresponding covariance matrix
Here σ
Ij=E (X
iX
j)-E (X
i) E (X
j) (E is a desired value in this formula).
Γ is the quadrature unit matrix, comprises the eigenvector of ∑, promptly
Γ * ∑ Γ=Λ=diag (λ
1..., λ
n), be without loss of generality here and can suppose λ
1〉=... 〉=λ
n〉=0.
The i row of Γ, γ
iBe the eigenvector of ∑, corresponding eigenvalue is λ
iMake that m=E (X) is the average of X, each X can be expressed as X=m+ Γ α so
Here α=(α
1..., α
n) be a vector, its α
i=<X-m, γ
i>α
iI the principal component that is called as X.Therefore, for a random vector X, made up a new random vector α.Have the situation of Gaussian Profile for X, promptly X~N (m, ∑) can provide the distribution of α.So, following formula is set up
(a)E(α
1)=0;
(c)cov(α
i,α
j)=E(α
iα
j)=0?for?i≠j;
Use a well known fact: incoherent Gaussian random variable also is independently, can draw α
1..., α
nBe conclusion independently, and α
i~N (0, λ
i).
The 3rd embodiment-Fisher differentiates conversion
Suppose that X has distribution F, its average is m, and covariance matrix is a ∑
F, and E has distribution G, and its average is 0, and covariance matrix is a ∑
G, this matrix is assumed that positive definite.Make that Γ is a matrix, by ∑
G -1∑
FEigenvector constitute, promptly
∑
G -1∑
FEigenvalue and ∑
G -1/2∑
F∑
G -1/2Eigenvalue equate.Therefore, for all i=1 ..., n has λ
i〉=0, and, can suppose λ not losing under the general situation
1〉=... 〉=λ
n〉=0.The i row of Γ, γ
iIt is ∑
G -1∑
FEigenvector, corresponding eigenvalue is λ
iUse Γ definition α=(α
1..., α
n) be α
i=<X-m, γ
iA vector.Therefore, made up a new random vector α for a random vector Y.
Suppose that X and E have Gaussian Profile, i.e. X~N (m, ∑
F) and E~N (0, ∑
G), ∑>0, and X here and E are independently, can prove in the following method so α~N (0, Λ+I).Significantly, α is that average is 0 normal distribution.In order to verify its covariance, at first observe
Here
Be one by ∑
G -1/2∑
F∑
G -1/2The orthogonal matrix that constitutes of eigenvector.So
VAR(α)=Γ(∑
G+∑
F)Γ
=I+Λ
Here final step has been used
Orthogonality and ∑
G -1/2∑
F∑
G -1/2Eigenvalue and ∑
G -1∑
F, the fact that equates of eigenvalue.This has proved asserting about the covariance matrix of α.
It is closely similar with principal component transformation in fact that Fisher differentiates conversion.Yet under the situation of coloured noise, promptly the covariance matrix of noise is not under the situation of multiple of unit matrix, and Fisher differentiates conversion can provide remarkable performance.
Be that the second and the 3rd embodiment determines subclass I
1
Below, suppose that biometric data X has zero-mean (the m this point always can realize by deducting).After using one of them above-mentioned conversion, can obtain a stochastic variable α=Γ
YThe component of α be the center and be incoherent.In addition, under one section the normality assumption, α has a normal distribution, and diagonal covariance matrix is arranged in front.This means component α
i, i=1 ..., n is independently.To use λ
iShow α
iVariance.
Should wander back to, thresholding is to derive from the noise level of the property set that measures, and subclass I
1Be to create like this: by giving set I
1Specify the attribute α that created of an absolute value greater than thresholding
iδ is a little positive number, is suitably selected according to noise level.Follow subclass I
1Constitute by active constituent: I
1=I
δ(α)=i=1 ..., n:| α
i|>δ }.Selecting about δ at the robustness of noise is one of most important parameter.In each specific case, should select δ based on the attribute of noise.Noise have normal distribution N (0, σ
N 2Id) under the situation, Id is a unit matrix here, must be according to σ
NSelect δ.For example, for principal component transformation, δ=3 σ
NOr δ=5 σ
NTo can guarantee correctly to discern a bit with 99.87% and 99.99997% probability respectively.
To show that below described conversion will provide the important component of sufficient amount with very big probability.Be expressed as for each i
p
i=P(|α
i|>δ),
Notice following about q
iEstimation have few meaning:
Consider stochastic variable
Notice z
i, i=1 ..., n is independently Bernoulli stochastic variable, wherein P (z
i=1)=p
i, P (z
i=0)=1-p
i=q
i
In order to make that certificate scheme is general, must guarantee a large amount of important component, or in other words and
Must under the condition of very big probability, be sizable.Notice that its desired value is provided by following formula
Very natural can suppose, has a large amount of components, and its variance is greater than c δ
2, c>1.A part of supposing these components is at least ρ.Note, if its variance is much larger than δ
2The quantity of component very little, the whole authentication question that has the physical object of this attribute so will become impossible.Should there be abundant " energy " to distinguish different measured values.If there are not enough abilities in signal, noise will occupy main positions.This will make that the authentication of robust is impossible.
Continue to estimate (1.1), can obtain
Therefore, can draw as drawing a conclusion: if a large amount of big component of variances that has is arranged, so we interested described and desired value will be at least these components quantity most.In other words, can not lose too many component.We estimate the probability of following incident: promptly and ∑
iz
iLess, just it is much smaller than desired value.In this case, we wish that this incident is impossible, and more properly, its probability diminishes with index.
Make k be less than an integer E (∑
I=1 nz
i), and consider probability
The Bernstein index inequality that can the use classics upper limit of deriving.
Make Y
1..., Y
nBe independent random variable, make | Y
i|≤M, E (Y
i)=0, so for each t>0,
Can prove
Here
Make Y
i=z
i-E (z
i), i=1 ..., n.So | Y
i|≤max (1-p
i, p
i)≤1, and
Order
And k=k
2N, and k
2<k
1
So:
Here
Example: k
1=0.4n, k
2=0.2n:
Example: k
1=0.4n, k
2=0.05n:
Minimizing information
From by the represented robust property set I of α
1Set out, reduce amount of information by carrying out a kind of reduction conversion.In principle, can use any suitable reduction conversion.Only use the expression of 1 bit can obtain minimum appearing.Advantageously, this can realize by using a kind of like this reduction conversion: the binary digit that the attribute (being component) of α is transformed into the symbol of this deal is represented.
The Heavidide function is a kind of so suitable conversion:
In addition or replacedly, can be by only selecting property set I
1A subclass come minimizing information.The selection that can be described in the enrollment process to be done by auxiliary data W.Then, this auxiliary data part of being used as verify data is stored and is used when the authentication so that realize selecting same subclass at that time.Preferably, for different application, create different, unique auxiliary data W.By this way, each use to use its oneself subclass (this may be overlapping certainly).
Thereby in a preferred embodiment, use Heaviside function and subclass to select, its target is based on α, i.e. property set I
1Create the secret C=(C of binary system of certain m bit
1..., C
m) ∈ 0,1}
mIf there is different label i
1..., i
mMake for each j=1 ..., m has i
j∈ I
1=I
δ(α), and for each j=1 ..., m has
So for α, secret C=(C
1..., C
m) can be considered to feasible.
For α, the set of the secret that all are feasible is expressed as C
δ(α)
0,1}
m:
C
δ(α)=C ∈ 0,1}
m: C is feasible for α }
Wish C
δ(α) big as far as possible.Under normality assumption, α
iHas symmetrical distribution.If so s
i=H (α
i), so
In a last trifle, shown that the quantity of the important component of expectation equals the part of n, for example γ n.In addition, having very for desired amt, the probability of big difference will diminish by index.Because for each α
iThe i of>δ, s
iBe the Bernoulli stochastic variable that is symmetrically distributed, so can expect that the s of half is probably arranged
iBe 1, and the s of half is probably arranged
iBe 0.Use similar index inequality, can prove that any desired value for half has very big departing from, all will become impossible by exponential manner.Therefore, m (secret length) can be chosen as a part of the desired value of important component quantity, i.e. m=γ
1N, for example γ
1=γ/10.Can prove that all are 2 years old
mMost of individual secret is feasible with very big probability for α all.Therefore, for certain physical measurement of an object, can guarantee and from a set greatly, to select a secret with very big probability.So authentication protocol according to the present invention is general on very big probability.On the other hand, in unlikely incident, this incident has only seldom feasible secret for a given biometric information, might use another linear transformation, for example use a kind of W of quadrature at random, for this specific biometric information generates a secret.
Therefore, might select a subclass α
Ij, provide secret C, wherein C
j=H (α
Ij).At this moment just can create auxiliary data W=W (X) by the row of getting Γ, its label is i
j, j=1 ..., k, promptly W is the matrix of a k * n.This auxiliary data is stored as the part of verify data.
Be that first embodiment determines subclass I
1
In the embodiment of first description, W can be selected as a random matrix.Suppose that measured X is the real vector of n-dimension.In registration phase, select an orthogonal matrix W at random.Make α=WY, select α with the component of enough big absolute value now.In principle, should expect to have a large amount of this equivalents.Using in these equivalents some (but is not whole! ) generate secret C=(c
1..., c
k), c here
k=H (α
Ik).In other words,
Here
Being the matrix of a k * n, is by selecting row I from W
1... I
kAnd obtain.If W can not cause the big component of sufficient amount, can generate the another one random matrix.
The preferred embodiment general introduction
Registration, example as shown in Fig. 2 A
(1) obtains certain actual corresponding attribute (such as biometrics) X=(X of described object
1..., X
n) measured value Y=(Y
1..., Y
n) ∈ R
n
(2) dependency collection Y creates the attribute of robust, provides the set I of the attribute of a robust
1
Carry out conversion α=Γ Y, Γ classifies to component of a vector according to the signal to noise ratio of estimating here.
Select set I:I
1=I
δ(α)=| α
i|>δ }, δ is that noise level from measure is derived here.
(3) minimizing information:
Select I
1Subclass; Selection has defined choice function W (X), and this W (X) is the subclass of conversion Γ, thereby the subclass of the attribute of selected robust is made of following formula: α
Ij=WY
Generate secret by on this subclass, carrying out reduction: for example, c
j=H (α
Ij) (H is the Heaviside function here) to have provided length be the binary code word C of k≤n.
(4) generate controlling value V, for example by using the one-way hash function hV=h (C) of anticollision
(5) storage: W, V
In a certain embodiments, W is the matrix of a k * n, and C=H (g (Y, W))=H (W (Y-m)), H is the Heaviside function here, m is a vector (for example average) that system is known.This average is done the every group average of measuring, if for example a fingerprint is repeatedly measured, and the fingerprint (promptly all fingerprints being averaged) that this average is exactly on average.
Therefore, whole signal processing function G is provided by G=Hog.In order to ensure the fail safe of verification process, preferably should select W like this so that C=G (Y, component W) is independently, or is incoherent at least, stochastic variable.In order to ensure privacy, C is a binary vector (in a preferred embodiment by the Heaviside function creation), therefore knows that C itself will can not provide one of biometric template good estimation.In addition, select by using by the subclass of W control, can be so that the dimension of C much smaller than the dimension of Y, effectively, be recorded about the most information of Y.In this case, and g (W, Y)=WY, for matrix W multiple attracting selection is arranged.For first embodiment, W may be selected random movement.Be that two preferred embodiments have provided detailed description above, wherein W is respectively a kind of constraint for the principal component transformation (PCT) of specific k-n-dimensional subspace n, and for a kind of constraint of the Fisher conversion of specific k-n-dimensional subspace n.
Authentication is as example among Fig. 2 B
(1) obtains W, Y
(2) obtain certain actual corresponding attribute (such as biometrics) X=(X of described object
1..., X
n) measurement Y=(Y
1..., Y
n) ∈ R
n
(3) minimizing information:
Determine the attribute set I of robust
1: α
Ij=WY
Calculate secret by carrying out reduction: for example, c
j=H (α
Ij) (H is the Heaviside function here) to have provided length be the binary code word C of k≤n.
(4) calculation control value V ' is for example by using one-way hash function the hV '=h (C) of anticollision
(5) if be complementary with the controlling value V that extracts, described object is just certified.
Should be noted that embodiment above-mentioned illustrates rather than limit the present invention, those of skill in the art can design many additional embodiments under the situation of the scope that does not deviate from accessory claim.In the claims, be placed on any reference symbol in the bracket and should be understood as that restriction claim.The element that verb " comprises " and the use of version is not got rid of in claim to be stated or the existence of element the step or step.The article that occurs before an element " a " or " an " do not get rid of and have a plurality of this elements.The present invention can be realized by the hardware mode that comprises several independent elements, and be realized by the computer mode of suitable programming.In the device claim, several modes have been enumerated, several can the realization in these modes by the same project in the hardware.Do not indicate in order not use the combination of these measures for the purpose of favourable in the fact of having stated some measure in the mutually different dependent claims.
Claims (16)
1. a generation is used to authenticate the method for the verify data of a physical object; This method comprises:
Use a kind of measuring process to measure the property set Y of a measurement of described object;
Create the property set I of a robust according to the property set Y of this measurement, the property set I of this robust satisfies a kind of predetermined robust standards;
Create the property set A of a simplification according to the property set I of this robust, the property set A of this simplification comprises still less the information about actual attribute than the property set Y of this measurement;
Generate a protected controlling value V and should protected controlling value insertion verify data according to the attribute of the property set A of this simplification.
2. the described method of claim 1, the step of wherein creating the property set A of this simplification comprise carries out a kind of reduction conversion.
3. the described method of claim 2, wherein said reduction conversion become an attribute transformation binary digit of the symbol of this attribute of expression.
4. the described method of claim 1, the step of wherein creating the property set A of this simplification comprises the subclass of the property set I that selects this robust.
5. the described method of claim 4 comprises that creating auxiliary data W controls the selection of described subclass and this auxiliary data W is inserted verify data being used for.
6. the described method of claim 5 is included as corresponding authentication application and creates unique auxiliary data W.
7. the described method of claim 1, wherein said predetermined robust standards be based on the signal to noise ratio of the attribute that measures, and the step of creating the property set I of this robust is included in property set Y and goes up and carry out the property set I that a kind of conversion Γ creates separation
1And I
2, I here
1The signal to noise ratio of attribute be estimated as and be higher than I
2The signal to noise ratio of attribute; And use I
1As property set I.
8. the described method of claim 7, wherein said conversion Γ is a kind of linear transformation, this conversion has a component α with what the vector of representation attribute collection Y converted expression set I to
iA vector, each vector components α here
iWith other component of a vector α
j(i ≠ j) separate and wherein said component of a vector is classified according to the signal to noise ratio of estimating.
9. the described method of claim 7 comprises the step of creating conversion Γ according to the statistical attribute of described measuring process.
10. the described method of claim 9, wherein said statistical attribute comprises the covariance matrix and the corresponding Distribution Statistics F that derive from the attribute X of the estimation of described object.
11. the described method of claim 7 comprises that noise level from the described property set that measures derives a thresholding and its absolute value of being created is assigned to set I greater than the attribute of thresholding
1
12. the described method of claim 1, the step of wherein creating protected controlling value V are included on the attribute of property set A of this simplification and carry out a kind of encryption function.
13. the described method of claim 12, wherein said encryption function are one-way functions.
14. method that authenticates physical object; This method comprises:
Use a kind of measuring process to measure the property set Y of a measurement of described object;
Create the property set I of a robust according to the property set Y of this measurement, the property set I of this robust satisfies a kind of predetermined robust standards;
Create the property set A of a simplification according to the property set I of this robust, the property set A of this simplification comprises still less the information about actual attribute than the property set Y of this measurement;
Attribute according to the property set A of this simplification generates a protected controlling value V ';
Be extracted in the protected controlling value V that has generated in the enrollment process for described physical object; And
If between the protected controlling value V of protected controlling value V ' that generates and extraction, have a kind of predetermined conforming words, then authenticate physical object.
15. system (100) that is used to authenticate physical object (105); This system comprises a calling mechanism (110), an authenticate device (140) and a memory (130) that is used for storing certification data;
Described calling mechanism (110) comprising:
An input (112) is used to receive the property set Y of the measurement of described object, and the property set Y of this measurement is to use a kind of measuring process to measure;
A processor (114) is used for the property set I according to the property set Y establishment robust of this measurement, and the property set I of this robust satisfies a kind of predetermined robust standards; Create the property set A that simplifies according to the property set I of this robust, the property set A of this simplification comprises still less the information about actual attribute than the property set Y of this measurement; And generate a protected controlling value V according to the attribute of the property set A of this simplification; And
An output (116) is used for supplying protected controlling value V to memory, and this protected controlling value V is used as the part of verify data; And
Described authenticate device (120) comprising:
An input (142) is used to receive the property set Y of the measurement of described object, and the property set Y of this measurement is to use a kind of measuring process to measure, and this input also is used for receiving protected controlling value V from memory;
A processor (144) is used for the property set I according to the property set Y establishment robust of this measurement, and the property set I of this robust satisfies a kind of predetermined robust standards; Be used for creating the property set A that simplifies according to the property set I of this robust, the property set A of this simplification comprises still less the information about actual attribute than this property set Y; Be used for protected controlling value V ' of attribute generation according to the property set A of this simplification; And if between protected controlling value V ' that generates and the protected controlling value V that extracts, have a kind of predetermined consistency, then be used to authenticate physical object; And
An output (146) is used to send one and shows whether authentic signal of described physical object.
16. authenticate device (140) that in the described system of claim 15, uses; This authenticate device comprises:
An input (142) is used to receive the property set Y of the measurement of physical object, and the property set Y of this measurement is to use a kind of measuring process to measure, and this input also is used for receiving protected controlling value V from memory;
A processor (144) is used for the property set I according to the property set Y establishment robust of this measurement, and the property set I of this robust satisfies a kind of predetermined robust standards; Be used for creating the property set A that simplifies according to the property set I of this robust, the property set A of this simplification comprises still less the information about actual attribute than the property set Y of this measurement; Be used for protected controlling value V ' of attribute generation according to the property set A of this simplification; And if between protected controlling value V ' that generates and the protected controlling value V that extracts, have a kind of predetermined consistency, then be used to authenticate physical object; And
An output (146) is used to send whether authentic signal of a described physical object of indication.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03101453 | 2003-05-21 | ||
EP03101453.3 | 2003-05-21 | ||
PCT/IB2004/050689 WO2004104899A2 (en) | 2003-05-21 | 2004-05-13 | Method and system for authentication of a physical object |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1792060A CN1792060A (en) | 2006-06-21 |
CN1792060B true CN1792060B (en) | 2011-05-25 |
Family
ID=33462195
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2004800136222A Expired - Lifetime CN1792060B (en) | 2003-05-21 | 2004-05-13 | Methd and system for authenticating physical object |
Country Status (8)
Country | Link |
---|---|
US (1) | US8032760B2 (en) |
EP (1) | EP1629628B1 (en) |
JP (1) | JP2007500910A (en) |
KR (1) | KR20060023533A (en) |
CN (1) | CN1792060B (en) |
AT (1) | ATE474393T1 (en) |
DE (1) | DE602004028118D1 (en) |
WO (1) | WO2004104899A2 (en) |
Families Citing this family (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2316120C2 (en) | 2004-05-12 | 2008-01-27 | Корпорация "Самсунг Электроникс" | Biometric authentication system |
EP2933746A1 (en) | 2004-05-17 | 2015-10-21 | Koninklijke Philips N.V. | Processing rights in drm systems |
US20070180261A1 (en) * | 2004-06-09 | 2007-08-02 | Koninklijke Philips Electronics, N.V. | Biometric template protection and feature handling |
EP1842203A4 (en) | 2004-11-12 | 2011-03-23 | Verayo Inc | Volatile device keys and applications thereof |
US8634606B2 (en) * | 2004-12-07 | 2014-01-21 | Mitsubishi Electric Research Laboratories, Inc. | Method and system for binarization of biometric data |
CN101091348B (en) | 2004-12-28 | 2011-09-07 | 皇家飞利浦电子股份有限公司 | Key generation using biometric data and secret extraction codes |
CN101116114A (en) * | 2005-02-10 | 2008-01-30 | 皇家飞利浦电子股份有限公司 | Improved security device |
RU2007144715A (en) | 2005-06-01 | 2009-06-10 | Конинклейке Филипс Электроникс Н.В. (Nl) | UPDATE TEMPLATE IN ASSISTANT DATA SYSTEMS |
JP2008541917A (en) * | 2005-06-01 | 2008-11-27 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Method, apparatus and system for compensating capture noise in a helper data system |
CN101185104A (en) | 2005-06-01 | 2008-05-21 | 皇家飞利浦电子股份有限公司 | Shaping classification boundaries in template protection systems |
CN101243513A (en) * | 2005-08-23 | 2008-08-13 | 皇家飞利浦电子股份有限公司 | Information carrier authentication with a physical one-way function |
JP4736744B2 (en) * | 2005-11-24 | 2011-07-27 | 株式会社日立製作所 | Processing device, auxiliary information generation device, terminal device, authentication device, and biometric authentication system |
JP5248328B2 (en) | 2006-01-24 | 2013-07-31 | ヴェラヨ インク | Equipment security based on signal generators |
JP4996904B2 (en) | 2006-10-04 | 2012-08-08 | 株式会社日立製作所 | Biometric authentication system, registration terminal, authentication terminal, and authentication server |
JP5113074B2 (en) | 2006-11-06 | 2013-01-09 | パナソニック株式会社 | Information security device |
JPWO2008056613A1 (en) * | 2006-11-06 | 2010-02-25 | パナソニック株式会社 | Authentication device |
DE602008005443D1 (en) * | 2007-04-12 | 2011-04-21 | Intrinsic Id Bv | CONTROLLED ACTIVATION OF A FUNCTION |
US8410902B2 (en) | 2007-05-14 | 2013-04-02 | Priv Id B.V. | Apparatuses, system and method for authentication |
JP5360521B2 (en) * | 2007-07-23 | 2013-12-04 | 国立大学法人 筑波大学 | Biometric information registration method and biometric authentication method |
WO2009079050A2 (en) * | 2007-09-19 | 2009-06-25 | Verayo, Inc. | Authentication with physical unclonable functions |
JP5662157B2 (en) | 2007-12-20 | 2015-01-28 | コーニンクレッカ フィリップス エヌ ヴェ | Definition of classification threshold in template protection system |
EP2297668A1 (en) * | 2008-06-27 | 2011-03-23 | Koninklijke Philips Electronics N.V. | Device, system and method for verifying the authenticity integrity and/or physical condition of an item |
EP2329423B1 (en) * | 2008-09-26 | 2018-07-18 | Koninklijke Philips N.V. | Authenticating a device and a user |
TWI498827B (en) * | 2008-11-21 | 2015-09-01 | Verayo Inc | Non-networked rfid-puf authentication |
US20100138654A1 (en) * | 2008-12-01 | 2010-06-03 | Apple Inc. | System and method for authentication based on particle gun emissions |
US8242892B2 (en) * | 2009-02-12 | 2012-08-14 | International Business Machines Corporation | System, method and program product for communicating a privacy policy associated with a radio frequency identification tag and associated object |
US8289135B2 (en) * | 2009-02-12 | 2012-10-16 | International Business Machines Corporation | System, method and program product for associating a biometric reference template with a radio frequency identification tag |
US8327134B2 (en) * | 2009-02-12 | 2012-12-04 | International Business Machines Corporation | System, method and program product for checking revocation status of a biometric reference template |
US8301902B2 (en) * | 2009-02-12 | 2012-10-30 | International Business Machines Corporation | System, method and program product for communicating a privacy policy associated with a biometric reference template |
US9298902B2 (en) * | 2009-02-12 | 2016-03-29 | International Business Machines Corporation | System, method and program product for recording creation of a cancelable biometric reference template in a biometric event journal record |
US8359475B2 (en) * | 2009-02-12 | 2013-01-22 | International Business Machines Corporation | System, method and program product for generating a cancelable biometric reference template on demand |
JP5548218B2 (en) * | 2009-03-06 | 2014-07-16 | イントリンシツク・イー・デー・ベー・ベー | System for establishing a cryptographic key that depends on a physical system |
US8249250B2 (en) * | 2009-03-30 | 2012-08-21 | Mitsubishi Electric Research Laboratories, Inc. | Secure similarity verification between homomorphically encrypted signals |
US9032476B2 (en) * | 2009-05-12 | 2015-05-12 | Empire Technology Development Llc | Secure authentication |
US8607057B2 (en) * | 2009-05-15 | 2013-12-10 | Microsoft Corporation | Secure outsourced aggregation with one-way chains |
US8811615B2 (en) * | 2009-08-05 | 2014-08-19 | Verayo, Inc. | Index-based coding with a pseudo-random source |
US8468186B2 (en) * | 2009-08-05 | 2013-06-18 | Verayo, Inc. | Combination of values from a pseudo-random source |
US9010646B2 (en) | 2010-04-01 | 2015-04-21 | Coin, Inc. | Optical contact loaded magnetic card |
US8998096B2 (en) | 2010-04-01 | 2015-04-07 | Coin, Inc. | Magnetic emissive use of preloaded payment card account numbers |
US20110161232A1 (en) * | 2009-12-28 | 2011-06-30 | Brown Kerry D | Virtualization of authentication token for secure applications |
US8694687B2 (en) | 2010-07-16 | 2014-04-08 | Intryca, Inc. | Computing-system identifier using software extraction of manufacturing variability |
US8842827B2 (en) | 2010-07-16 | 2014-09-23 | Intryca, Inc. | Mobile phone aided operations system and method |
US8516269B1 (en) | 2010-07-28 | 2013-08-20 | Sandia Corporation | Hardware device to physical structure binding and authentication |
US8868923B1 (en) | 2010-07-28 | 2014-10-21 | Sandia Corporation | Multi-factor authentication |
US8848905B1 (en) | 2010-07-28 | 2014-09-30 | Sandia Corporation | Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting |
US8667265B1 (en) | 2010-07-28 | 2014-03-04 | Sandia Corporation | Hardware device binding and mutual authentication |
US8891762B2 (en) * | 2010-12-10 | 2014-11-18 | Mitsubishi Electric Research Laboratories, Inc. | Method for privacy-preserving order selection of encrypted element |
WO2012122994A1 (en) | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
DE102011117979A1 (en) * | 2011-11-09 | 2013-05-16 | Deutsche Telekom Ag | Method for providing data and / or interaction possibilities between a user and a data processing device |
DE102012201016A1 (en) * | 2012-01-24 | 2013-07-25 | Bundesdruckerei Gmbh | Document-based key |
JP6069876B2 (en) * | 2012-04-06 | 2017-02-01 | 凸版印刷株式会社 | IC chip authentication system |
US9018972B1 (en) | 2012-06-04 | 2015-04-28 | Sandia Corporation | Area-efficient physically unclonable function circuit architecture |
US9996480B2 (en) | 2012-07-18 | 2018-06-12 | Analog Devices, Inc. | Resilient device authentication system with metadata binding |
US9405891B1 (en) * | 2012-09-27 | 2016-08-02 | Emc Corporation | User authentication |
EP2933945A4 (en) * | 2012-12-14 | 2016-08-03 | Nec Corp | Bit string matching system, method, and program |
US8965066B1 (en) * | 2013-09-16 | 2015-02-24 | Eye Verify LLC | Biometric template security and key generation |
US10341112B2 (en) | 2014-03-21 | 2019-07-02 | Koninklijke Philips N.V. | Soft generation of biometric candidates and references based on empirical bit error probability |
US9946858B2 (en) | 2014-05-05 | 2018-04-17 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US9672342B2 (en) | 2014-05-05 | 2017-06-06 | Analog Devices, Inc. | System and device binding metadata with hardware intrinsic properties |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US9501664B1 (en) | 2014-12-15 | 2016-11-22 | Sandia Corporation | Method, apparatus and system to compensate for drift by physically unclonable function circuitry |
US9760737B2 (en) * | 2015-06-12 | 2017-09-12 | Qualcomm Incorporated | Techniques for integrated circuit data path confidentiality and extensions thereof |
US10911229B2 (en) | 2016-08-04 | 2021-02-02 | Macronix International Co., Ltd. | Unchangeable physical unclonable function in non-volatile memory |
US10855477B2 (en) * | 2016-08-04 | 2020-12-01 | Macronix International Co., Ltd. | Non-volatile memory with physical unclonable function and random number generator |
US10404478B2 (en) | 2016-08-04 | 2019-09-03 | Macronix International Co., Ltd. | Physical unclonable function using divided threshold distributions in non-volatile memory |
US11258599B2 (en) | 2016-08-04 | 2022-02-22 | Macronix International Co., Ltd. | Stable physically unclonable function |
US10680809B2 (en) * | 2016-08-04 | 2020-06-09 | Macronix International Co., Ltd. | Physical unclonable function for security key |
WO2018122235A1 (en) * | 2016-12-30 | 2018-07-05 | Robert Bosch Gmbh | Reverse computational fuzzy extractor and method for authentication |
US10425235B2 (en) | 2017-06-02 | 2019-09-24 | Analog Devices, Inc. | Device and system with global tamper resistance |
US10958452B2 (en) | 2017-06-06 | 2021-03-23 | Analog Devices, Inc. | System and device including reconfigurable physical unclonable functions and threshold cryptography |
US10521651B2 (en) * | 2017-10-18 | 2019-12-31 | Global Tel*Link Corporation | High definition camera and image recognition system for criminal identification |
US20190307270A1 (en) * | 2018-04-06 | 2019-10-10 | Ronald D. Blum | Cooling Pillow |
DE102018132996A1 (en) * | 2018-12-19 | 2020-06-25 | Uniscon Universal Identity Control Gmbh | Procedure for monitoring the integrity of a physical object |
US10992714B2 (en) | 2019-01-07 | 2021-04-27 | International Business Machines Corporation | Certifying authenticity via dynamic dimensional coordinate scanning and decentralized data storage |
US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
US11380379B2 (en) | 2020-11-02 | 2022-07-05 | Macronix International Co., Ltd. | PUF applications in memories |
US11722903B2 (en) | 2021-04-09 | 2023-08-08 | Northrop Grumman Systems Corporation | Environmental verification for controlling access to data |
CN114419719B (en) * | 2022-03-29 | 2022-08-12 | 北京爱笔科技有限公司 | Biological characteristic processing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5291560A (en) * | 1991-07-15 | 1994-03-01 | Iri Scan Incorporated | Biometric personal identification system based on iris analysis |
CN1168185A (en) * | 1995-11-08 | 1997-12-17 | 冲电气工业株式会社 | Iris data collation system |
CN1283036A (en) * | 1999-07-29 | 2001-02-07 | 松下电器产业株式会社 | Noice detector, noise detection method, signal precessor and signal processing method |
CN1346116A (en) * | 2000-09-25 | 2002-04-24 | 王介生 | Method for identifying human body biological characteristics |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3824951A (en) * | 1973-12-17 | 1974-07-23 | Vantine A Le | Fingerprinting machine |
US3947876A (en) * | 1975-01-06 | 1976-03-30 | C. J. Kennedy Company | Dual density 800 bpi NRZI and 1600 bpi PE read circuit for a digital magnetic tape transport |
GB2171880A (en) | 1985-03-01 | 1986-09-03 | Stc Plc | Local area network |
JPH06290154A (en) | 1993-04-05 | 1994-10-18 | Hitachi Ltd | Network power management system |
US5659626A (en) * | 1994-10-20 | 1997-08-19 | Calspan Corporation | Fingerprint identification system |
WO1997013217A1 (en) * | 1995-10-05 | 1997-04-10 | Fujitsu Denso Ltd. | Fingerprint registration method and fingerprint collation apparatus |
AU4196497A (en) * | 1996-09-18 | 1998-04-14 | Dew Engineering And Development Limited | Biometric identification system for providing secure access |
US6035398A (en) * | 1997-11-14 | 2000-03-07 | Digitalpersona, Inc. | Cryptographic key generation using biometric data |
DE19848340A1 (en) | 1998-10-21 | 2000-04-27 | Philips Corp Intellectual Pty | Local network with bridge terminal for the transfer of data between several sub-networks |
US7219368B2 (en) * | 1999-02-11 | 2007-05-15 | Rsa Security Inc. | Robust visual passwords |
JP2001338290A (en) * | 2000-05-26 | 2001-12-07 | Minolta Co Ltd | Device and method for image processing and computer- readable with medium recording recorded with image processing program |
US7093131B1 (en) * | 2000-09-29 | 2006-08-15 | Seiko Epson Corporation | Information authenticating apparatus and authenticating station |
JP3938872B2 (en) * | 2001-02-02 | 2007-06-27 | 松下電器産業株式会社 | Data classification device and object recognition device |
US20020196963A1 (en) * | 2001-02-23 | 2002-12-26 | Biometric Security Card, Inc. | Biometric identification system using a magnetic stripe and associated methods |
JP4644984B2 (en) * | 2001-07-10 | 2011-03-09 | 村田機械株式会社 | Biometrics authentication device and its program |
US20030191764A1 (en) * | 2002-08-06 | 2003-10-09 | Isaac Richards | System and method for acoustic fingerpringting |
US20040125993A1 (en) * | 2002-12-30 | 2004-07-01 | Yilin Zhao | Fingerprint security systems in handheld electronic devices and methods therefor |
-
2004
- 2004-05-13 WO PCT/IB2004/050689 patent/WO2004104899A2/en active Application Filing
- 2004-05-13 AT AT04744336T patent/ATE474393T1/en not_active IP Right Cessation
- 2004-05-13 DE DE602004028118T patent/DE602004028118D1/en not_active Expired - Lifetime
- 2004-05-13 US US10/557,628 patent/US8032760B2/en active Active
- 2004-05-13 EP EP04744336A patent/EP1629628B1/en not_active Expired - Lifetime
- 2004-05-13 CN CN2004800136222A patent/CN1792060B/en not_active Expired - Lifetime
- 2004-05-13 KR KR1020057022220A patent/KR20060023533A/en not_active Application Discontinuation
- 2004-05-13 JP JP2006530848A patent/JP2007500910A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5291560A (en) * | 1991-07-15 | 1994-03-01 | Iri Scan Incorporated | Biometric personal identification system based on iris analysis |
CN1168185A (en) * | 1995-11-08 | 1997-12-17 | 冲电气工业株式会社 | Iris data collation system |
CN1283036A (en) * | 1999-07-29 | 2001-02-07 | 松下电器产业株式会社 | Noice detector, noise detection method, signal precessor and signal processing method |
CN1346116A (en) * | 2000-09-25 | 2002-04-24 | 王介生 | Method for identifying human body biological characteristics |
Also Published As
Publication number | Publication date |
---|---|
JP2007500910A (en) | 2007-01-18 |
ATE474393T1 (en) | 2010-07-15 |
EP1629628B1 (en) | 2010-07-14 |
CN1792060A (en) | 2006-06-21 |
WO2004104899A3 (en) | 2005-01-27 |
US20070044139A1 (en) | 2007-02-22 |
WO2004104899A2 (en) | 2004-12-02 |
EP1629628A2 (en) | 2006-03-01 |
DE602004028118D1 (en) | 2010-08-26 |
US8032760B2 (en) | 2011-10-04 |
KR20060023533A (en) | 2006-03-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1792060B (en) | Methd and system for authenticating physical object | |
Rane et al. | Secure biometrics: Concepts, authentication architectures, and challenges | |
Sutcu et al. | A secure biometric authentication scheme based on robust hashing | |
Matyas et al. | Toward reliable user authentication through biometrics | |
Buhan et al. | Fuzzy extractors for continuous distributions | |
Campisi | Security and privacy in biometrics: towards a holistic approach | |
Simoens et al. | Privacy weaknesses in biometric sketches | |
US8281148B2 (en) | Securely computing a similarity measure | |
US6185316B1 (en) | Self-authentication apparatus and method | |
Wang et al. | A theoretical analysis of authentication, privacy, and reusability across secure biometric systems | |
US20030056100A1 (en) | Method and system for authenticating a digitized signature for execution of an electronic document | |
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
US20020184509A1 (en) | Multiple factor-based user identification and authentication | |
EP0983662A1 (en) | Identification and security using biometric measurements | |
Chandra et al. | Cancelable biometric template generation and protection schemes: A review | |
Asthana et al. | A novel biometric crypto system based on cryptographic key binding with user biometrics | |
Hine et al. | A zero-leakage fuzzy embedder from the theoretical formulation to real data | |
Buhan et al. | A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem | |
Latha et al. | A study on attacks and security against fingerprint template database | |
Plaga | Biometric keys: suitable use cases and achievable information content | |
Barman et al. | Fingerprint based symmetric cryptography | |
Tuyls et al. | Privacy protecting biometric authentication systems: an overview | |
Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
Cimato et al. | Biometrics and privacy | |
Hine | Anonymous biometrics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CX01 | Expiry of patent term | ||
CX01 | Expiry of patent term |
Granted publication date: 20110525 |